... and now we can SPL "(?<foo>s[hi]{2}t)"
Mary Cordova @cyphoid_mary ShellCon 2020
... and now we can SPL "(?<foo>s[hi]{2}t)" Mary - - PowerPoint PPT Presentation
... and now we can SPL "(?<foo>s[hi]{2}t)" Mary Cordova @cyphoid_mary ShellCon 2020 Something(s) about Mary Splunk Trust Member, Splunk Certified Architect SIEM 2013-16 @ <insert biggest gaming company you can think
Mary Cordova @cyphoid_mary ShellCon 2020
@ <insert biggest gaming company you can think of here>
@ <insert Hollywood agency for your favorite A-lister here>
@ <insert your 2nd favorite (or maybe 3rd) comic book movie studio here>
SANS GIAC6, CCNA, SSCP, ISC2 Exam Developer
B.S. Computer Information Systems
WSC, DC310, ISSA, …
2
SIEM, SOC, IR, data, Splunk
3
4
5
6
7
during an incident?
monitored because they indicate something bad could be happening?
could be useful in an investigation?
what?!
8
source that you can search for in Splunk
something that you know (not think) already
locating data “pretty please”
| tstats count WHERE index=* by index sourcetype
frequently a full days’ worth of work at least and often more
9
*Search Processing Language
10
using “| fields - field field field…”
appropriate) with CIM (Common Information Model)
etc
normalized 10-20 fields with the most important values in your data
used over and over for various analytics
11
12
for further normalization
noise
sample of all data within our time range is an ugly surprise O_o
The Admin Guide for your data source can help you identify fields to group different types of events so that you can work on smaller logically similar sets of data one at a time You need several samples of each type of event so that you no only have representation of the different types but the different data values that can be found in each of those types
13
14
15
quick guide in the back :D
16